Feeds

EA games web server was hosting PHISHING SITE – securobod

Old vulnerable software gave hackers a way in, claims researcher

The Essential Guide to IT Transformation

An Electronic Arts server was hacked and used to host a phishing site targeting Apple ID holders, according to internet security firm Netcraft.

The site has since been pulled down and EA has told various news sites that it is "investigating" the report.

Netcraft security expert Paul Mutton posted on the company's blog that the server was used by two websites in the ea.com domain, and usually hosted a calendar based on an old piece of software that contained several security vulnerabilities which have since been sorted out - WebCalendar 1.2.0.

"It is likely that one of these vulnerabilities was used to compromise the server, as the phishing content is located in the same directory as the WebCalendar application," he said.

Mutton said the phishing site attempted to get victims to sign in with their Apple ID and password and then verify their name, card number, expiry date, verification code, date of birth, phone number, mother's maiden name and basically every piece of info necessary to completely steal a person's identity.

If the poor victim got that far, they were then redirected to the legitimate Apple ID site, potentially none the wiser, he claimed.

Mutton said that companies who left old pieces of software hanging around on their servers were asking for trouble.

"The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities," he said.

Dwayne Melancon, CTO of security software firm Tripwire, said that businesses weren't doing enough to ensure that these sorts of vulnerabilities were shut down.

"We regularly see attackers take advantage of neglected, abandoned, or unpatched applications running on company infrastructure. This is interesting in that it is a problem that we know how to solve but enterprises just aren’t taking the necessary precautions," he said.

It's unclear how long the phishing site was active on Electronic Arts' server or how many people might have been tricked into handing over their Apple IDs. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.